A SOC receives several alerts indicating user accounts are connecting to the company's identity provider through non-secure communications. User credentials for accessing sensitive, business-critical systems could be exposed. Which of the following logs should the SOC use when determining malicious intent?
Intrusion Detection Systems (IDS) logs provide visibility into network traffic patterns and can help detect insecure or unusual connections. These logs will show if non-secure protocols are used, potentially revealing exposed credentials. According to CompTIA CySA+, IDS logs are essential for identifying malicious activity related to communications and network intrusions. Options like DNS (A) and tcpdump (B) provide network details, but IDS specifically monitors for intrusions and unusual activities relevant to security incidents.
Louann
3 months agoAzalee
3 months agoGertude
3 months agoShakira
4 months agoBettina
4 months agoShanice
4 months agoMertie
4 months agoAlecia
4 months agoLovetta
5 months agoAzalee
5 months agoLucia
5 months agoGlen
5 months agoKenda
5 months agoEura
1 year agoSheridan
1 year agoDarell
1 year agoReid
1 year agoMarge
1 year agoRebecka
1 year agoLynna
1 year agoWillard
1 year agoLorrie
1 year agoTerrilyn
1 year agoKris
1 year agoAdell
1 year agoTheron
1 year agoCora
1 year agoTequila
1 year agoTora
1 year agoMeaghan
1 year ago